Ameritech (NYSE: AIT) serves millions of customers in 50 states and 40 countries. Ameritech provides a full range of communications services including local and long-distance telephone and data, cellular, paging, security, cable TV, Internet and more. One of the world's 100 largest companies, Ameritech (www.ameritech.com) has 70,500 employees, 1 million shareowners and more than $30 billion in assets. Ameritech also operates the Internet Network Access Point (NAP) in Chicago, the largest Asynchronous Transfer Mode (ATM) access point in the world. Ameritech has also been selected by the National Science Foundation as the global NAP for the next generation Internet initiative. iCAIR Press Release February 1999

ACH

Automated Clearing House

Automated Clearing House (ACH) is the name of an electronic network for financial transactions in the United States. ACH processes large volumes of both credit and debit transactions which are originated in batches.- More From Wikipedia -

ACL

Access Control List

In computer security, an access control list (ACL) is a list of permissions attached to an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. - More From Wikipedia -

AD

Active Directory

Active Directory (AD) is an implementation of LDAP directory services by Microsoft for use primarily in Windows environments. The main purpose of Active Directory is to provide central authentication and authorization services for Windows based computers. - More From Wikipedia -

ADO

ActiveX Data Object

Microsoft ActiveX Data Objects (ADO) is a set of Component Object Model objects for accessing data sources. It provides a layer between programming languages and OLE DB (a means of accessing data stores in a uniform manner), which allows a developer to write programs which access data, without knowing how the database is implemented. - More From Wikipedia -

ADOdb

ActiveX Data Object Database

ADOdb is a database abstraction library for PHP and Python based on the same concept as Microsoft's ActiveX Data Objects. It allows developers to write applications in a fairly consistent way regardless of the underlying database storing the information. The advantage is that the database can be changed without re-writing every call to it in the application. - More From Wikipedia -

ADR

Advanced Data Recording

ADSL

Asymmetric Digital Subscriber Line

Asymmetric Digital Subscriber Line (ADSL) is a form of DSL, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. - More From Wikipedia -

AH is a protocol that provides authentication of either all or part of the contents of a datagram through the addition of a header that is calculated based on the values in the datagram. - More From TCP/IP Guide -

AM

Amplitude Modulation

Amplitude modulation (AM) is a technique used in electronic communication, most commonly for transmitting information via a radio carrier wave. - More From Wikipedia -

AMI

Alternate Mark Inversion

When used on a T-carrier, bipolar encoding is known as Alternate Mark Inversion because, in this context, a binary 1 is referred to as a "mark", while a binary 0 is called a "space".[2] The coding was used extensively in first-generation PCM networks, and is still commonly seen on older multiplexing equipment today. - More From Wikipedia -

ANS

Advanced Network Services

ANSI

American National Standards Institute

The American National Standards Institute or ANSI (IPA pronunciation: [ænsiː]) is a private nonprofit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States. - More From Wikipedia -

AP

Access Point

In computer networking, a wireless access point (WAP or AP) is a device that connects wireless communication devices together to form a wireless network. - More From Wikipedia -

API

Application Program Interface

An application programming interface (API) is a source code interface that a computer application, operating system or library provides to support requests for services to be made of it by a computer program. - More From Wikipedia -

APIPA

Automatic Private IP Addressing

Zeroconf or Zero Configuration Networking is a set of techniques that automatically create a usable IP network without configuration or special servers. (Redirected from APIPA) - More From Wikipedia -

ARP

Address Resolution Protocol

In computer networking, the Address Resolution Protocol (ARP) is the standard method for finding a host's hardware address when only its network layer address is known. - More From Wikipedia -

ARPA

Advanced Research Projects Agency

The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the development of new technology for use by the military. (Redirected from Advanced Research Projects Agency) - More From Wikipedia -

ARPANET

Advanced Research Projects Agency Network

The Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the United States Department of Defense was the world's first operational packet switching network, and the predecessor of the global Internet. - More From Wikipedia -

ASCII

American Standard Code for Information Interchange

American Standard Code for Information Interchange (ASCII) is a character encoding based on the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that work with text. - More From Wikipedia -

Active Server Pages (ASP) is Microsoft's server-side script engine for dynamically-generated web pages. It is marketed as an add-on to Internet Information Services (IIS). - More From Wikipedia - An application service provider (ASP) is a business that provides computer-based services to customers over a network. - More From Wikipedia -

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). - More From Wikipedia -

AVI

Audio Visual Interleaved

Audio Video Interleave, known by its acronym AVI, is a multimedia container format introduced by Microsoft in November 1992 as part of its Video for Windows technology. AVI files can contain both audio and video data in a standard container that allows synchronous audio-with-video playback. - More From Wikipedia -

Business-to-government e-commerce (B2G) networks allow businesses to bid on government RFPs in a reverse auction fashion. Public sector organizations (PSO's) post tenders in the form of RFP's, RFI's, RFQ's etc. and suppliers respond to them. - More from Wikipedia -

BASH

Bourne Again Shell

Bash is a Unix shell written for the GNU Project. The name of the actual executable is bash. Its name is an acronym for Bourne-again shell. - More from Wikipedia -

BDC

Backup Domain Controller

In Windows NT 4 server domains, the Backup Domain Controller (BDC) is a computer that has a copy of the user accounts database. - More from Wikipedia -

BERT

Bit-Error Rate Test

BGP

Border Gateway Protocol

The Border Gateway Protocol (BGP) is the core routing protocol of the Internet. It works by maintaining a table of IP networks or 'prefixes' which designate network reachability among autonomous systems (AS). - More from Wikipedia -

BIND

Berkeley Internet Name Domain

BIND (Berkeley Internet Name Domain) is the most commonly used DNS server on the Internet, especially on Unix-like systems, where it is a de facto standard. - More from Wikipedia -

BLOB

Binary Large Object

A binary large object, also known as a blob, is a collection of binary data stored as a single entity in a database management system. - More from Wikipedia -

Consumer-to-business (C2B ) is an electronic commerce business model in which consumers (individuals) offer products and services to companies and the companies pay them. This business model is a complete reversal of traditional business model where companies offer goods and services to consumers (business-to-consumer = B2C). - More from Wikipedia -

C2C

Consumer to Consumer

Consumer-to-consumer (or C2C) electronic commerce involves the electronically-facilitated transactions between consumers through some third party. A common example is the online auction, in which a consumer posts an item for sale and other consumers bid to purchase it; the third party generally charges a flat fee or commission. - More from Wikipedia -

CA

Certification Authority

In cryptography, a certificate authority or certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party. CAs are characteristic of many public key infrastructure (PKI) schemes. There are many commercial CAs that charge for their services. Institutions and governments may have their own CAs, and there are also free CAs. - More from Wikipedia -

CAN

Campus Area Network

A campus area network (CAN) is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form of a metropolitan area network, specific to an academic setting. - More from Wikipedia -

CAU

Controlled Access Unit

CDF

Channel Definition Format

Channel Definition Format (CDF) is an XML standard used in conjunction with Microsoft Active Channel and Smart Offline Favorites technologies. Its use is to define a website's content and structure. - More from Wikipedia -

CGI

Common Gateway Interface

The Common Gateway Interface (CGI) is a standard protocol for interfacing external application software with an information server, commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the output from the application to the web browser. - More from Wikipedia -

CHAP

Challenge Handshake Authentication Protocol

CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. - More from Wikipedia -

CIDR

Classless Inter-Domain Routing

Classless Inter-Domain Routing (CIDR, pronounced "cider") was introduced in 1993 and is the latest refinement to the way IP addresses are interpreted. - More from Wikipedia -

CIR

Committed Information Rate

Committed Information Rate or CIR in a Frame relay network is the average bandwidth for a virtual circuit guaranteed by an ISP to work under normal conditions. At any given time the bandwidth should not fall below this committed figure. It is usually expressed in kilobits per second (kbit/s). - More from Wikipedia -

CNAME

Canonical Name

CO

Central Office

CODEC

Compressor/Decompressor / Coder/Decoder

A codec is a device or program capable of performing encoding and decoding on a digital data stream or signal. The word codec may be a combination of any of the following: 'Compressor-Decompressor', 'Coder-Decoder', or 'Compression/Decompression algorithm'. - More from Wikipedia -

COM

Common Object Model

Component Object Model (COM) is a platform for software componentry introduced by Microsoft in 1993. It is used to enable interprocess communication and dynamic object creation in any programming language that supports the technology. - More from Wikipedia -

CORBA

Common Object Request Broker Architecture

The Common Object Request Broker Architecture (CORBA) is a standard defined by the Object Management Group (OMG) that enables software components written in multiple computer languages and running on multiple computers to work together. - More from Wikipedia -

CPAN

Comprehensive Perl Archive Network

CPAN is an acronym standing for Comprehensive Perl Archive Network, an archive of over 12,200 modules of software written in Perl, as well as documentation for it. - More from Wikipedia -

CPU

Central Processing Unit

A central processing unit (CPU), or sometimes simply processor, is the component in a digital computer capable of executing a program. - More from Wikipedia -

CRC

Cyclical Redundancy Check

A cyclic redundancy check (CRC) is a type of function that takes as input a data stream of any length and produces as output a value of a certain fixed size. The term CRC is often used to denote either the function or the function's output. - More from Wikipedia -

CSMA/CA

Carrier Sense Multiple Access / Collision Avoidance

In computer networking, CSMA/CA belongs to a class of protocols called multiple access methods. CSMA/CA stands for: Carrier Sense Multiple Access With Collision Avoidance. In CSMA, a station wishing to transmit has to first listen to the channel for a predetermined amount of time so as to check for any activity on the channel. If the channel is sensed "idle" then the station is permitted to transmit. If the channel is sensed as "busy" the station has to defer its transmission. - More from Wikipedia -

CSMA/CD

Carrier Sense Multiple Access / Collision Detection

Carrier Sense Multiple Access With Collision Detection (CSMA/CD) is a network control protocol in which a carrier sensing scheme is used. A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to send that frame again. - More from Wikipedia -

CSNW

Client Services for NetWare

CSS

Cascading Style Sheet

Cascading Style Sheets (CSS) is a stylesheet language used to describe the presentation of a document written in a markup language. Its most common application is to style web pages written in HTML and XHTML. - More from Wikipedia -

CSU

Channel Service Unit

In telecommunications, a channel service unit (CSU) is a line bridging device for use with T-carrier. - More from Wikipedia -

CSU/DSU

Channel Service Unit/Data Service Unit

A CSU/DSU (Channel Service Unit/Data Service Unit) is a digital-interface device used to connect a router to a digital circuit such as a T1 or T3 line. A CSU/DSU operates at the physical layer (layer 1) of the OSI model. - More from Wikipedia -